Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • Dr. Abdelsalam Maatuk joined to Omar Al Mukhtar University in Nov. 2009 as a lecturer. Following a lecturer in comput... moreedit
    The use of health information technology has become highly effective in healthcare quality as it enhances personal and public care, broadens diagnostic accuracy, reduces medical costs and errors, and improves the effectiveness of both... more
    The use of health information technology has become highly effective in healthcare quality as it enhances personal and public care, broadens diagnostic accuracy, reduces medical costs and errors, and improves the effectiveness of both organizational and clinical processes. This study aims to assess physicians' perceptions of perceived benefits and barriers of electronic prescribing (e-Prescribing) software and their implementation. A self-prepared questionnaire was developed, distributed, and filled by physicians (n = 100) from different departments at Benghazi Medical Center, Libya. The Statistical Package for Social Sciences (SPSS) program was used to analyze the results. The results showed that more than 90% of physicians preferred the e-Prescribing software, with most of them believing that they were able to provide better services to patients by saving time and effort (87%), and checking drug interaction (82%), as well as reducing medical errors (89%). On the other hand, the results indicated that the main barriers are the lack of adequate infrastructure, awareness sessions, and human and material resources. Physicians prefer to use the e-Prescribing software, as it supports decision-makers to design more effective strategies and implementation plans. The study recommended the necessity of holding awareness sessions and training programs for using e-Prescribing software.
    The emergence of the Corona pandemic and the consequent closure of many different activities, especially educational activities, to prevent the gathering and crowding of people, made e-learning a savior and a haven for continuing the... more
    The emergence of the Corona pandemic and the consequent closure of many different activities, especially educational activities, to prevent the gathering and crowding of people, made e-learning a savior and a haven for continuing the educational process in the whole world. However, some developing countries, including Libya, which did not previously rely on e-learning and distance education, faced many challenges and difficulties during that period to avoid the closure of schools and universities. To shed light on these challenges and in an attempt to overcome them, we conducted a two-part study on the obstacles that prevent the application of e-learning in Libya. The first study concerns the point of view of university faculty members, and the second one concerns the students' point of view. Both studies were conducted at the Libyan International Medical University in Benghazi, Libya. During the study, the descriptive-analytical method was used, and two questionnaires were distributed to reach the desired results. This paper aims to make a comparison between the results of the two questionnaires through four classifications of issues associated with e-learning, namely, social issues, accessibility issues, issues related to faculty members, and issues related to students. All these four categories were compared through the perspectives of faculty members and students, and thus the convergences between the teachers' and students' opinions of e-learning were identified. The opinions were closer, as they led to the diagnosis of the problems facing e-learning and their ordering according to the importance of their impact, leading to some important recommendations.
    The large volume of data available in many domains and the need to analyze the data to extract useful information from it has lead to the need of visualization techniques to get information about the data at a glance. Visual inspection is... more
    The large volume of data available in many domains and the need to analyze the data to extract useful information from it has lead to the need of visualization techniques to get information about the data at a glance. Visual inspection is useful in providing fast and abstract information about datasets to guide the researchers in choosing the suitable approach to process the data. Recently, there have been notable advances in graph visualization; however, visualizing sets still needs more attention. In this paper a method is proposed to visualize overlapping sets so that the underlying hierarchy and relations of the sets can be easily understood by visual inspection. This approach utilizes the graph representation of the sets to aid the drawing process. Using the spectral decomposition of the graph derived from the sets, we developed algorithms to compute the best coordinates for the items of the sets and plot them on the Euclidean plane. The method has been tested on both real and synthetic datasets to investigate its performance.
    In this paper, an intelligent decision support system has been proposed for skin disease diagnosis using a hybrid model of Case-Based Reasoning and Artificial Neural Network techniques. The proposed model uses nine input variables... more
    In this paper, an intelligent decision support system has been proposed for skin disease diagnosis using a hybrid model of Case-Based Reasoning and Artificial Neural Network techniques. The proposed model uses nine input variables (attributes) that have a major effect on the skin diagnosing process. The output of the model is the diagnosis and the treatment. An interactive and user friendly computer application has been developed in order to realize the approach. We have applied the system on a real-world data collected from a dermatology department. The model has been validated and the system tested using a separate set of data (test cases). The results demonstrate that the proposed intelligent system is feasible, and its performance is good and acceptable.
    This paper describes a study that compares the results of mobile app usability testing in various environments. The comparison includes two of the most popular platforms among users, Apple's iOS and Google's with five of the... more
    This paper describes a study that compares the results of mobile app usability testing in various environments. The comparison includes two of the most popular platforms among users, Apple's iOS and Google's with five of the eligible participants. Google Drive is the name of the app that was developed for the Google Android platform on the Samsung Galaxy S10 smartphone and the Apple iOS platform on the iPhone Pro 11. Participants were given a scenario to complete. The scenario is broken down into three tasks that have to be completed in a specific order which is: Increase the capacity, Move, and Search. Each task's performance was evaluated using specific criteria, i.e., time taken to complete the task, total mistakes in the task, and time taken to correct a mistake. To collect user feedback, suggestions, and notes, the System Usability Scale (SUS) questionnaire was used. According to the findings of the empirical study and the evaluation review, there were no significant usability issues in terms of efficiency on either platform. There was a discrepancy in the implementation of tasks in a task for the benefit of one of the systems and in another task for the benefit of the other system. Taking all of these disparities and results into account, as well as what was revealed by a more comprehensive analysis of the SUS survey responses, we come to the conclusion that the iOS model outperformed the Android platform.
    The process of transformation from informal requirements stated in natural language into a formal specification such as Unified Modeling Language (UML) is an important challenge. User requirements that are expressed in natural language... more
    The process of transformation from informal requirements stated in natural language into a formal specification such as Unified Modeling Language (UML) is an important challenge. User requirements that are expressed in natural language can be very problematic, which makes the requirements analysis a difficult task. In this paper, we propose a method to analyze the natural language requirements and generate sequence and collaboration diagrams from these requirements, which are commonly used to describe the behavior of software systems. A case study was accomplished to compare the diagrams generated by the proposed approach to the diagrams produced by other approaches. The results showed that the elements of the sequence and collaboration diagrams extracted through our approach are very satisfactory and they would be acceptable as initial analysis models.
    Clustering in data mining is a powerful tool for gaining knowledge. There is tremendous knowledge in the field of clustering as it has recently appeared in several different applications. The density-based method is a successful technique... more
    Clustering in data mining is a powerful tool for gaining knowledge. There is tremendous knowledge in the field of clustering as it has recently appeared in several different applications. The density-based method is a successful technique for large datasets (big data). Algorithms such as the well-known DBSCAN algorithm can find clusters of random shapes defined as high- and low-density regions. This paper presents an enhanced algorithm (called eDBSCAN) that works on large data sets as it can handle large sets of data with high accuracy. This is to obtain the set number of groups of clusters (K) on the experimental approach in the traditional DBSCAN algorithm. We used the classified data set to avoid the main problem of the partitioned technique that clarifies the number of K, i.e., clusters. An experimental study was conducted to prove the effectiveness of the proposed algorithm in finding the value of Epsilon parameters (Eps), where the algorithm was applied to a synthetic data set and it was proven that the eDBSCAN algorithm achieved scalability with large data sets and a high degree of purity.
    The failure in propagating software changes properly during the maintenance process is one of the main causes of defects and poor software performance. It also increases the time consumed while searching for related changes manually. In... more
    The failure in propagating software changes properly during the maintenance process is one of the main causes of defects and poor software performance. It also increases the time consumed while searching for related changes manually. In addition, incomplete changes increase the cost of the maintenance process, by hiring highly paid senior developers, to give consultations for maintaining the software systems. In this paper, we present an approach called Change Propagation Path (CPP), which is a data mining method that aims at helping developers to predict software complementary changes and perform changes correctly. The CPP approach employs the frequent pattern analysis technique to be used on historical data stored within software repositories. We have designed a web-based tool called Wide Assisting and Leading (WALead) and conducted an experimental study as a proof of concept and to validate the proposed approach. The WALead tool was designed to support developers remotely and through any platform. The tool has been tested in terms of its effects on the maintenance process, and to prove the feasibility of the CPP approach.
    Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to support the identification and handling of crosscutting concerns. Crosscutting concerns are considered as potential aspects and... more
    Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to support the identification and handling of crosscutting concerns. Crosscutting concerns are considered as potential aspects and can lead to the phenomenal "tyranny of the dominant decomposition". Requirements-level aspects are responsible for producing scattered and tangled descriptions of requirements in the requirements document. Requirements validation artifact is an essential task in software development. This task ensures that requirements are correct and valid in terms of completeness and consistency, hence, reducing the development cost, maintenance and establish an approximately correct estimate of effort and completion time of the project. In this paper, we present a validation framework for aspectual requirements that can be used with AORE approaches to facilitate the validation of the resulting crosscutting relationships and aspects. The proposed framework comprises a high-level and low-level validation. The high-level validation is to validate the concerns with stakeholders, whereas the low-level validation validates the aspectual requirement by developers using a checklist. The approach has been evaluated using a case study. The results demonstrate that the proposed framework is feasible and acceptable.
    The Corona pandemic has become a threat to humanity, as the spread of the coronavirus has led to the closure of many institutions as well as many economic, social, and educational activities. In order not to stop the educational process,... more
    The Corona pandemic has become a threat to humanity, as the spread of the coronavirus has led to the closure of many institutions as well as many economic, social, and educational activities. In order not to stop the educational process, various educational institutions, including universities, have moved to remote electronic education methods (e-learning) instead of the well-known traditional education system. As several organizations concerned with education have made their electronic platforms and libraries available almost free of charge to alleviate the load on, students and teachers. Despite the advantages provided by e-learning methods, it is accompanied by some difficulties and obstacles that must be dealt with to reduce its effects. This study aims to identify the most important challenges facing the use of e-learning from the university instructor's perspective. The study assesses instructor's opinions, level of satisfaction, and readiness to use e-learning and its...
    One of the significantaspects of software quality is usability. It is one of the characteristics that judge by the success or failure of software applications. The most important risk facing the software applications is usability which... more
    One of the significantaspects of software quality is usability. It is one of the characteristics that judge by the success or failure of software applications. The most important risk facing the software applications is usability which may lead to the existence of a gap between users and systems. This may lead to system failure because of Poor design. This is due to the design is not based on the desires and requirements of the customer. To overcome these problems, this paper proposed an approach to improve usability of software applications to meet the needs of the customer and interacts with the user easily with an efficient and effective manner.The proposed approach is based prototyping technique due to itssimplicity and it does not require additional costs to elicit precise and complete requirement and design.
    This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target... more
    This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target XML database to be managed and handled in its new environment. The source schema is enriched semantically and translated into a target schema, and the data stored in the source database is converted into a target database based on the new schema. The semantic enrichment process is requisite to produce an enhanced metadata model from the source database and captures essential characteristics of target XML schema, and suitable for converting RDB data into an XML document. Algorithms are developed for producing the target database according to a set of migration rules to translate all constructs of an RDB into an XML Schema, based on which RDB data is then converted. A prototype system has been implemented and empirically evaluated by testing its result...
    There is a wide range of available biological databases developed by bioinformatics experts, employing different methods to extract biological data. In this paper, we investigate and evaluate the performance of some of these methods in... more
    There is a wide range of available biological databases developed by bioinformatics experts, employing different methods to extract biological data. In this paper, we investigate and evaluate the performance of some of these methods in terms of their ability to efficiently access bioinformatics databases using web-based interfaces. These methods retrieve bioinformatics information using structured and semi-structured data tools, which are able to retrieve data from remote database servers. This study distinguishes each of these approaches and contrasts these tools. We used Sequence Retrieval System (SRS) and Entrez search tools for structured data, while Perl and BioPerl search programs were used for semi-structured data to retrieve complex queries including a combination of text and numeric information. The study concludes that the use of semi-structured data tools for accessing bioinformatics databases is a viable alternative to the structured tools, though each method is shown to...
    In recent years, Software Security has gained an important role in the research of information systems as the increasing popularity of hacking and attacking software systems. Therefore, the need for security measures grows and many... more
    In recent years, Software Security has gained an important role in the research of information systems as the increasing popularity of hacking and attacking software systems. Therefore, the need for security measures grows and many researchers have put security measures into account from the early stages of software development starting from the requirement engineering phase. Traditional security methods introduced numerous approaches to this subject from the identification of security requirements representation using different processes and techniques such as misuse case diagrams and attack trees, etc. However, these approaches focus on identifying security requirements and ignoring their inclusion in the system. This study investigates the problem of embedding security requirements within the system to ensure and improve security. A framework has been proposed to overcome this problem. The framework has been applied to a case study, i.e., Car Rental System and FileZilla FTP Serve...
    One of the significantaspects of software quality is usability. It is one of the characteristics that judge by the success or failure of software applications. The most important risk facing the software applications is usability which... more
    One of the significantaspects of software quality is usability. It is one of the characteristics that judge by the success or failure of software applications. The most important risk facing the software applications is usability which may lead to the existence of a gap between users and systems. This may lead to system failure because of Poor design. This is due to the design is not based on the desires and requirements of the customer. To overcome these problems, this paper proposed an approach to improve usability of software applications to meet the needs of the customer and interacts with the user easily with an efficient and effective manner.The proposed approach is based prototyping technique due to itssimplicity and it does not require additional costs to elicit precise and complete requirement and design.
    Research Interests:
    Although Medical (or patient) records are important as they constitute the documentation of patients' health status. The advances in information technologies are reflected in electronic patient records so that patient data can be... more
    Although Medical (or patient) records are important as they constitute the documentation of patients' health status. The advances in information technologies are reflected in electronic patient records so that patient data can be stored in databases, which could have a positive impact on patient care. Therefore, identifying the important benefits, and studying the obstacles that limit the effectiveness of using Electronic Medical Information Systems (EMISs) needs further investigation. This study aims to investigate the use of EMISs by medical and ancillary medical staff at Benghazi Medical Center, Libya. The descriptive-analytical method has been applied along with the analysis of results by the statistical methods. The study identifies the skills of the medical staff in using computers and determines the extent of their awareness of using EMISs. The study also determines the level of their knowledge of the effectiveness of using this type of system, while identifying the benef...
    Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data... more
    Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data warehouses is a persistent challenge. Data cleaning aims at finding, correcting data errors and inconsistencies. This paper presents a general framework for the implementation of data cleaning according to the scientific principles followed in the data warehouse field, where the framework offers guidelines that define and facilitate the implementation of the data cleaning process to the enterprises interested in the data warehouse field. The research methodology used in this study is qualitative research, in which the data are collected through system analyst interviews. The study concluded that the low level of data quality is an obstacle to any progress in the implementation of modern technological projects, where data quality is a prerequisite for the suc...
    Rapid changes in information technology, the emergence of object-based and WWW applications, and the interest of organisations in securing benefits from new technologies have made information systems re-engineering in general and database... more
    Rapid changes in information technology, the emergence of object-based and WWW applications, and the interest of organisations in securing benefits from new technologies have made information systems re-engineering in general and database migration in particular an active research area. In order to improve the functionality and performance of existing systems, the re-engineering process requires identifying and understanding all of the components of such systems. An underlying database is one of the most important component of information systems. A considerable body of data is stored in relational databases (RDBs), yet they have limitations to support complex structures and user-defined data types provided by relatively recent databases such as object-based and XML databases. Instead of throwing away the large amount of data stored in RDBs, it is more appropriate to enrich and convert such data to be used by new systems. Most researchers into the migration of RDBs into object-based...
    Due to the large expansion of Electronic Gates (E-Gates) in universities and faculties, and their important role in providing various services for different types of users; it is necessary to measure the quality of the performance of... more
    Due to the large expansion of Electronic Gates (E-Gates) in universities and faculties, and their important role in providing various services for different types of users; it is necessary to measure the quality of the performance of these types of gates in terms of providing the required services optimally. This study aims to evaluate the availability of quality standards in E-Gates through a field study on the E-Gate of the faculty of Information Technology at the University of Benghazi. The analytical descriptive method was used to analyze the results obtained from a developed questionnaire as a study tool. Significant and important recommendations have been reached at the end of the analysis of the results.
    The use of Information Technology (IT) has been growing over decades in many human activities. It has also been accepted in educational institutions for teaching and learning. Several studies have been conducted to evaluate the success... more
    The use of Information Technology (IT) has been growing over decades in many human activities. It has also been accepted in educational institutions for teaching and learning. Several studies have been conducted to evaluate the success and acceptance of E-learning systems and tools by students and teaching staff. In this study, we attempt to acquire students' and instructor's perspectives on the use and implementing E-learning systems in a public university. The study targets the society that includes students and teaching staff in the IT faculty at the University of Benghazi. The descriptive-analytical method has been applied along with the analysis of results by the statistical methods. Two types of questionnaires were developed and distributed, i.e., student questionnaire and teaching staff questionnaire. Four dimensions have been highlighted to reach the expected results, i.e., the extent of using E-learning, advantages, disadvantages and obstacles of implementing E-lear...
    Relational DataBases (RDBs) are dominant in the market place yet they have limitations in the support of complex structure and user-defined data types provided by relatively recent database technologies (i.e., object-based and XML... more
    Relational DataBases (RDBs) are dominant in the market place yet they have limitations in the support of complex structure and user-defined data types provided by relatively recent database technologies (i.e., object-based and XML databases). Such a mismatch inspires work on migrating an RDB into these technologies. The problem is how to effectively migrate existing RDBs, as a source, into the recent database technologies, as targets, and what is the best way to enrich RDBs' semantics and constraints in order to meet the characteristics of these targets? Existing work does not appear to provide a solution for more than one target database. We tackle this question by proposing a solution for migrating an RDB into these targets based on available standards. The solution takes an existing RDB as input, enriches its metadata representation with as much semantics as possible, and constructs an enhanced Relational Schema Representation (RSR). Based on the RSR, a canonical data model i...
    This paper proposes an approach for translating an existing relational database (RDB) schema into relatively newer database (i.e., object-oriented, object-relational and XML) schemas, based on available standards. The approach is superior... more
    This paper proposes an approach for translating an existing relational database (RDB) schema into relatively newer database (i.e., object-oriented, object-relational and XML) schemas, based on available standards. The approach is superior to existing proposals as it generates three different and equivalent target schemas. The solution takes an RDB as input, enriches its metadata representation with required semantics, and generates an enhanced canonical data model, which captures essential characteristics of the target schemas, and is appropriate for translation into any of the three target schemas. To demonstrate the effectiveness and validity of the approach, a prototype has been developed, which realises the concepts and algorithms of our approach, and generates target schemas successfully. A set of experiments has been conducted, the results of which are very encouraging showing that the proposed method is feasible, efficient and correct.
    This paper surveys the recent literature about various research trends relevant to Relational DataBase (RDB) reengineering. The paper presents an analysis of approaches and techniques used in this context, including construction of object... more
    This paper surveys the recent literature about various research trends relevant to Relational DataBase (RDB) reengineering. The paper presents an analysis of approaches and techniques used in this context, including construction of object views on top of RDBs, database integration and database migration. A categorisation is presented of the selected work, concentrating on migrating an RDB as a source into object-based and XML databases as targets. Database migration from the source into each of the targets is discussed and critically evaluated, including the semantic enrichment, schema translation and data conversion. Based on a detailed analysis of the existing literature, it seems that the existing work does not provide a complete solution for more than one target database for either schema or data conversion. Besides, none of the existing proposals can be considered as a method for migrating an RDB into an object-relational database. We propose such a method based on an intermedi...
    Several tools and approaches have been proposed to generate Unified Modeling Language (UML) diagrams. Researchers focus on automating the process of extracting valuable information from Natural Language (NL) text to generate UML models.... more
    Several tools and approaches have been proposed to generate Unified Modeling Language (UML) diagrams. Researchers focus on automating the process of extracting valuable information from Natural Language (NL) text to generate UML models. The existing approaches show less accurateness because of the ambiguity of NL. In this paper, we present a method for generation class models from software specification requirements using NL practices and a set of heuristic rules to facilitate the transformation process. The NL requirements are converted into a formal and controlled representation to increase the accuracy of the generated class diagram. A set of pre-defined rules has been developed to extract OO concepts such as classes, attributes, methods, and relationships to generate a UML class diagram from the given requirements specifications. The approach has been applied and evaluated practically, where the results show that the approach is both feasible and acceptable.
    In the Internet of Things (IoT) area, the increase of data leads to the "Big data'' problem. The traditional relational database (RDB) is not being able to deal with processing big data. In contrast, the Not only SQL (NoSQL)... more
    In the Internet of Things (IoT) area, the increase of data leads to the "Big data'' problem. The traditional relational database (RDB) is not being able to deal with processing big data. In contrast, the Not only SQL (NoSQL) database was created to deal with big data problems. Therefore, most organizations need to convert their data stored in RDB systems into NoSQL using flexible models and processes. Most research into the conversion of RDBs into newer database systems has concentrated on schemata transformation, RDB data publishing, whereas other little work focuses on data migration. This paper proposes an automatic approach to convert a database implemented in MySQL database management system into an equivalent database for the target MongoDB system, which is a leading NoSQL database system. This method can handle a large amount of existing data in RDBs without any loss or changes in data semantics and data instances. The solution takes an existing RDB as input, ext...
    In the last years, many methods and tools for generating Unified Modeling Language (UML) class diagrams from natural language (NL) software requirements. These methods and tools deal with the transformation of NL textual requirements to... more
    In the last years, many methods and tools for generating Unified Modeling Language (UML) class diagrams from natural language (NL) software requirements. These methods and tools deal with the transformation of NL textual requirements to UML diagrams. The transformation process involves analyzing NL requirements and extracting relevant information from the text to generate UML class models. This paper aims to survey the existing works of transforming textual requirements into UML class models to indicate their strengths and limitations. The paper provides a comprehensive explanation and evaluation of the existing approaches and tools. The automation degree, efficiency, and completeness, as well as the used techniques, are studied and analyzed. The study demonstrated the necessity of automating the process, in addition to combining artificial intelligence with engineering requirements and using Natural Language Processing (NLP) techniques to extract class diagrams from NL requirements.
    There is a wide range of available biological databases developed by bioinformatics experts, employing different methods to extract biological data. In this paper, we investigate and evaluate the performance of some of these methods in... more
    There is a wide range of available biological databases developed by bioinformatics experts, employing different methods to extract biological data. In this paper, we investigate and evaluate the performance of some of these methods in terms of their ability to efficiently access bioinformatics databases using web-based interfaces. These methods retrieve bioinformatics information using structured and semi-structured data tools, which are able to retrieve data from remote database servers. This study distinguishes each of these approaches and contrasts these tools. We used Sequence Retrieval System (SRS) and Entrez search tools for structured data, while Perl and BioPerl search programs were used for semi-structured data to retrieve complex queries including a combination of text and numeric information. The study concludes that the use of semi-structured data tools for accessing bioinformatics databases is a viable alternative to the structured tools, though each method is shown to...
    In this paper, we present a solution for translating an existing relational database (RDB) schema with recent patents into relatively newer database (i.e., object-oriented and object-relational database) schemas, based on available... more
    In this paper, we present a solution for translating an existing relational database (RDB) schema with recent patents into relatively newer database (i.e., object-oriented and object-relational database) schemas, based on available standards. The solution is more beneficial compared to the existing approaches as it generates two different and equivalent target schemas based on the user choice. The main aim of the proposed method is to enrich the source RDB semantically with metadata information, which may have not been obviously represented in it. An enriched common data model is then produced, which preserves all necessary characteristics of target models to be mapped into any of the target schemas. A prototype has been designed in order to translate RDBs into target schemas realizing the concepts and algorithms of the approach. An experiment has been conducted, results of which have been very encouraging, and validating the feasibility, efficiency and correctness of the proposed solution.
    Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements... more
    Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to cope with the issue of tangling and scattering resulted from crosscutting concerns. Crosscutting concerns are considered as potential aspects and can lead to the phenomena "tyranny of the dominant decomposition". Requirements-level aspects are responsible for producing scattered and tangled descriptions of requirements in the requirements document. Validation of requirements artefacts is an essential task in software development. This task ensures that requirements are correct and valid in terms of completeness and consistency, hence, reducing the development cost, maintenance and establish an approximately correct estimate of effort and completion time of the project. In this paper, we present a validation framework to validate the aspectual requirements and the crosscutting relationship of concerns that are resulted from the requirements engineering phase. The proposed framework comprises a high-level and low-level validation to implement on software requirements specification (SRS). The high-level validation validates the concerns with stakeholders, whereas the low-level validation validates the aspectual requirement by requirements engineers and analysts using a checklist. The approach has been evaluated using an experimental study on two AORE approaches. The approaches are viewpoint-based called AORE with ArCaDe and lexical analysis based on Theme/Doc approach. The results obtained from the study demonstrate that the proposed framework is an effective validation model for AORE artefacts.
    Research Interests:
    Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements... more
    Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to cope with the issue of tangling and scattering resulted from crosscutting concerns. Crosscutting concerns are considered as potential aspects and can lead to the phenomena “tyranny of the dominant decomposition”. Requirements-level aspects are responsible for producing scattered and tangled descriptions of requirements in the requirements document. Validation of requirements artefacts is an essential task in software development. This task ensures that requirements are correct and valid in terms of completeness and consistency, hence, reducing the development cost, maintenance and establish an approximately correct estimate of effort and completion time of the project. In this paper, we present a validation framework to valida...

    And 25 more